Op Bizarre Bazaar: New LLMjacking Campaign Targets Unprotected Models
Overview
Pillar Security Research has identified a significant cyberattack campaign called Operation Bizarre Bazaar, orchestrated by a hacker going by the name Hecker. This operation took place between December 2025 and January 2026, with over 35,000 sessions aimed at infiltrating AI systems. The attackers sought to hijack computing power and monetize their access through a platform called silver.inc. This incident raises serious concerns for organizations that rely on AI technologies, as it highlights vulnerabilities in unprotected models that can be exploited for malicious purposes. Companies using AI systems need to be vigilant about security measures to prevent unauthorized access and potential misuse of their resources.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: AI systems, computing power resources, silver.inc platform
- Action Required: Organizations should implement stronger security protocols for AI systems, including access controls and monitoring for unauthorized sessions.
- Timeline: Ongoing since December 2025
Original Article Summary
Pillar Security Research has discovered Operation Bizarre Bazaar, a massive cyberattack campaign led by a hacker known as Hecker. Between December 2025 and January 2026, over 35,000 sessions were recorded targeting AI systems to steal compute power and resell access via silver.inc.
Impact
AI systems, computing power resources, silver.inc platform
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Ongoing since December 2025
Remediation
Organizations should implement stronger security protocols for AI systems, including access controls and monitoring for unauthorized sessions.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Malware.